Please use this identifier to cite or link to this item: http://localhost:8081/xmlui/handle/123456789/11972
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSowmya, R.-
dc.date.accessioned2014-11-28T10:59:32Z-
dc.date.available2014-11-28T10:59:32Z-
dc.date.issued2009-
dc.identifierM.Techen_US
dc.identifier.urihttp://hdl.handle.net/123456789/11972-
dc.guideGarg, Kumkum-
dc.description.abstractAn Intrusion Detection System (IDS) is an automated system that aims to detect intrusions or attacks in a computer system. The main goal of IDS is to detect any unauthorized use, abuse, or misuse of computer system by both system insiders and external attackers. The IDS architectures commonly used Centralized IDS, but these systems suffer from single point of failure and at heavy Ioad these CIDS may not detect all attacks. That limits their configurability, scalability and efficiency. The difficulty of these IDS leads the idea of agents based IDS. In this work, a novel IDS is proposed which addresses the problems of existing Centralized IDS. This proposed system uses agents along with a Network Intrusion Detection System (NIDS) to efficiently detect and trace back an internal attacker. The proposed system satisfies all necessary requirements, i.e. it should be easily and frequently updated with new attack signatures, it should adapt to changes in network topology and it should detect anomalous events or beaches in security should be detected in real-time and reported immediately. To eliminate single point of failure in the system proposed, NIDS are replicated at the secondary monitor. Existing Distributed Intrusion Detection Systems send whole system log, thus requiring a larger bandwidth, but in system proposed Agents send only required results to the monitor station, thus requiring a smaller bandwidth. The system uses misuse detection model for detecting attacks in the network. The proposed architecture has been developed in Java. This system uses IBM Aglet 2.0.12 to provide a mobile agent environment, the open source database-Mysql as the background DB , gcc 4.3.1 for generating attack, inotify-java, which is a Linux kernel subsystem for file system event notification and open source jpcap 0.7 at monitor station for sniffing networken_US
dc.language.isoenen_US
dc.subjectELECTRONICS AND COMPUTER ENGINEERINGen_US
dc.subjectDETECTION SYSTEMen_US
dc.subjectDISTRIBUTED INTRUSIONen_US
dc.subjectCOMPUTER SYSTEMen_US
dc.titleAN AGENT BASED DISTRIBUTED INTRUSION DETECTION SYSTEMen_US
dc.typeM.Tech Dessertationen_US
dc.accession.numberG14456en_US
Appears in Collections:MASTERS' THESES (E & C)

Files in This Item:
File Description SizeFormat 
ECDG14456.pdf2.61 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.